Proposal Submission Deadline: October 30, 2008
Applied Cryptography for Cyber Security and Defense:
Information Encryption and Cyphering
A book edited by Dr. Hamid R. Nemati and Dr. Li Yang
The University of North Carolina at Greensboro and University of
Tennessee at Chattanooga


Cryptography provides the most efficient services for defending
against threats in cyber space and holds great promise as the
technology to provide security, especially when security becomes one
of the top concerns for businesses worldwide.  The security of a
system is decided by the weakest link and the real-world constraints
make the cryptography much less effective than they are in a purely
mathematical world. The cryptography in real-world networks and
systems has been less effective than cryptography as a mathematical
science because of engineering discipline that converts the
mathematical promise of cryptographic security into a reality of
security.  Building real-world cryptographic systems is different from
the abstract theories of cryptography with only pure mathematics.
Designers and implementers face real-world constraints which are
experienced by most cryptographic systems. In order to achieve
real-world security goals, cryptographic techniques should be applied
in a real-world setting in order to build and engineer a secure
cryptographic system. Therefore, there is a need to explore and
investigate applied cryptography that bridges the gap between
cryptographic theory and real-world cryptographic applications.
Applied cryptography gives concrete advice about how to design,
implement and evaluate cryptographic systems within real-world

Objective of the Book

As applied cryptography becomes more demanding in information security
and privacy, a resource about cryptography as an engineering
discipline used to meet specific requirements is necessary.
Therefore, this book will be written for professionals who want to
improve their understanding about how to bridge the gap between
cryptographic theory and real-world cryptographic applications and how
to adapt cryptography solutions to emerging areas that have special
requirements.  This book will delve into the specific security
requirements and opponents in various emerging application areas and
discuss the procedure about engineering cryptography into system
design and implementation.  To engineer cryptography into a real-world
secure system requires the understanding of both real-world
constraints of a specific area and mastering of cryptographic
algorithms and techniques.  This book will be about building a secure
system in real settings, which is the essence of applied cryptography
in information security and privacy. It will provide business
professionals, college researchers, professors, students, or
consultants with a general overview of how to engineer cryptography
into a real-world system to secure information transmission,
processing and storage, thus reducing threats of information security
for businesses.

Target Audience

The target audience of this book will consist of professionals and
researchers who are particularly interested in how cryptography is
applied to information security and privacy and how cryptography
provides defense for organizations in a variety of areas including
networks, email, e-commerce, databases, and management.  This book
will be useful to:

-        Business Professionals/ISA Management and Staff

Anyone in business who deals with security and assurance of
information (managers, project leaders, ISA staff) and anyone who
designs and implements security policies should consider the
real-world constraints, potential opponents, cryptographic algorithms
and implementation guidelines described in this book.

-        University Information System and Security Faculty and Students   

Faculty and students can use this book to learn the context and
application of cryptography in traditional and emerging fields because
applied cryptography bridges cryptography as mathematical theories
with its real-world settings.

-        ISA Product/Service Vendors and Consultants

Vendors and consultants specializing in information security, network
security and privacy can benefit from the book's industry overview,
current industry snapshot, organizational and technical challenges,
and trends impacting future direction of applied cryptography.

Recommended topics include, but are not limited to, the following:

Applied Cryptography using quantum computing
Applied Cryptography in Network Security 
Applied Cryptography in Wireless Networks 
Applied Cryptography in E-mail Service and Web Services 
Applied Cryptography in Electronic Commerce 
Applied Cryptography in Regulations and Compliance 
Applied Cryptography in Personal and Pervasive Computing 
Applied Cryptography in Database Security and Privacy 
Applied Cryptography in Hardware Architecture
Future Trends of Applied Cryptography 

Submission Procedure

Researchers and practitioners are invited to submit on or before
October 30, 2008, a 2-3 page chapter proposal clearly explaining the
mission and concerns of his or her proposed chapter. Authors of
accepted proposals will be notified by November 15, 2008 about the
status of their proposals and sent chapter guidelines. Full chapters
are expected to be submitted by February 15, 2009. All submitted
chapters will be reviewed on a double-blind review basis. This book is
scheduled to be published by IGI Global (formerly Idea Group Inc.),
publisher of the "Information Science Reference" (formerly Idea Group
Reference) and "Medical Information Science Reference" imprints.  For
additional information regarding the publisher, please visit <> .

Inquiries and submissions can be forwarded electronically (Word
document) to:

Dr. Hamid R. Nemati 
ISOM Dept., Bryan School of Business and Economics
The University of North Carolina at Greensboro
P.O. Box 26165, Greensboro, NC 27402-6165 


Dr. Li Yang
Department of Computer Science and Engineering
The University of Tennessee at Chattanooga
615 McCallie Avenue
Chattanooga, TN 37403-2598